From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Towards Applying the Composition Principle to Verify a Microkernel Operating System., , , , , и . TPHOLs, том 1125 из Lecture Notes in Computer Science, стр. 235-250. Springer, (1996)DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET., , , и . RAID, том 4219 из Lecture Notes in Computer Science, стр. 249-271. Springer, (2006)The Design and Implementation of a Data Level Database Inference Detection System., и . DBSec, том 142 из IFIP Conference Proceedings, стр. 253-266. Kluwer, (1998)Mechanizing a Programming Logic for the Concurrent Programming Language microSR in HOL., , , , , , и . HUG, том 780 из Lecture Notes in Computer Science, стр. 29-42. Springer, (1993)CTPLAN: A Planning-Based Approach to Automatically Detecting Flaws in Concurrent Algorithms., , и . KBSE, стр. 151-160. IEEE Computer Society, (1991)Intrusion detection inter-component adaptive negotiation., , , , , , , , и . Comput. Networks, 34 (4): 605-621 (2000)DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET., , и . AsiaCCS, стр. 395-397. ACM, (2007)Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components., и . S&P, стр. 122-135. IEEE Computer Society, (1991)Protecting routing infrastructures from denial of service using cooperative intrusion detection., и . NSPW, стр. 94-106. ACM, (1997)Data Level Inference Detection in Database Systems., и . CSFW, стр. 179-189. IEEE Computer Society, (1998)